var-201406-0373
Vulnerability from variot
The Juniper Junos Pulse Secure Access Service (SSL VPN) devices with IVE OS before 7.4r5 and 8.x before 8.0r1 and Junos Pulse Access Control Service (UAC) before 4.4r5 and 5.x before 5.0r1 enable cipher suites with weak encryption algorithms, which make it easier for remote attackers to obtain sensitive information by sniffing the network. Successfully exploiting this issue in conjunction with other latent vulnerabilities may allow attackers to gain access to sensitive information that may aid in further attacks. The former is a client that supports remote and mobile users to access corporate resources with various Web devices. The latter is a standards-based, scalable network access control solution. A remote attacker could exploit this vulnerability to obtain sensitive information by sniffing the network
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201406-0373", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "unified access control software", "scope": "eq", "trust": 1.9, "vendor": "juniper", "version": "5.0" }, { "model": "unified access control software", "scope": "eq", "trust": 1.9, "vendor": "juniper", "version": "4.4" }, { "model": "ive os", "scope": "eq", "trust": 1.9, "vendor": "juniper", "version": "8.0" }, { "model": "ive os", "scope": "eq", "trust": 1.9, "vendor": "juniper", "version": "7.4" }, { "model": "secure access 4500", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": null }, { "model": "infranet controller 4500", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": null }, { "model": "mag4610 gateway", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": null }, { "model": "secure access 2500", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": null }, { "model": "infranet controller 4000", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": null }, { "model": "secure access 700", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": null }, { "model": "fips secure access 4000", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": null }, { "model": "fips infranet controller 6500", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": null }, { "model": "infranet controller 6000", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": null }, { "model": "infranet controller 6500", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": null }, { "model": "mag2600 gateway", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": null }, { "model": "mag6610 gateway", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": null }, { "model": "mag6611 gateway", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": null }, { "model": "fips secure access 4500", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": null }, { "model": "fips secure access 6500", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": null }, { "model": "fips secure access 6000", "scope": "eq", "trust": 1.0, "vendor": "juniper", "version": null }, { "model": "infranet controller 6500", "scope": null, "trust": 0.8, "vendor": "juniper", "version": null }, { "model": "secure access 700", "scope": null, "trust": 0.8, "vendor": "juniper", "version": null }, { "model": "fips secure access 4000", "scope": null, "trust": 0.8, "vendor": "juniper", "version": null }, { "model": "ive os", "scope": "lt", "trust": 0.8, "vendor": "juniper", "version": "8.x" }, { "model": "ive os", "scope": "eq", "trust": 0.8, "vendor": "juniper", "version": "8.0r1" }, { "model": "infranet controller 4000", "scope": null, "trust": 0.8, "vendor": "juniper", "version": null }, { "model": "secure access 6500", "scope": null, "trust": 0.8, "vendor": "juniper", "version": null }, { "model": "infranet controller 6500 fips", "scope": null, "trust": 0.8, "vendor": "juniper", "version": null }, { "model": "fips secure access 6000", "scope": null, "trust": 0.8, "vendor": "juniper", "version": null }, { "model": "infranet controller 4500", "scope": null, "trust": 0.8, "vendor": "juniper", "version": null }, { "model": "mag4610 gateway", "scope": null, "trust": 0.8, "vendor": "juniper", "version": null }, { "model": "junos pulse access control service", "scope": "eq", "trust": 0.8, "vendor": "juniper", "version": "5.0r1" }, { "model": "mag2600 gateway", "scope": null, "trust": 0.8, "vendor": "juniper", "version": null }, { "model": "mag6611 gateway", "scope": null, "trust": 0.8, "vendor": "juniper", "version": null }, { "model": "secure access 4500", "scope": null, "trust": 0.8, "vendor": "juniper", "version": null }, { "model": "infranet controller 6000", "scope": null, "trust": 0.8, "vendor": "juniper", "version": null }, { "model": "mag6610 gateway", "scope": null, "trust": 0.8, "vendor": "juniper", "version": null }, { "model": "junos pulse access control service", "scope": "lt", "trust": 0.8, "vendor": "juniper", "version": "5.x" }, { "model": "fips secure access 6500", "scope": null, "trust": 0.8, "vendor": "juniper", "version": null }, { "model": "secure access 2500", "scope": null, "trust": 0.8, "vendor": "juniper", "version": null }, { "model": "fips secure access 4500", "scope": null, "trust": 0.8, "vendor": "juniper", "version": null }, { "model": "secure access", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "700" }, { "model": "secure access", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "4500" }, { "model": "secure access", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "2500" }, { "model": "mag6611 gateway", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "0" }, { "model": "mag6610 gateway", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "0" }, { "model": "mag4610 gateway", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "0" }, { "model": "mag2600 gateway", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "0" }, { "model": "infranet controller", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "6500" }, { "model": "infranet controller", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "6000" }, { "model": "infranet controller", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "4500" }, { "model": "infranet controller", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "4000" }, { "model": "fips secure access", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "6500" }, { "model": "fips secure access", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "6000" }, { "model": "fips secure access", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "4500" }, { "model": "fips secure access", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "4000" }, { "model": "fips infranet controller", "scope": "eq", "trust": 0.3, "vendor": "juniper", "version": "6500-" }, { "model": "junos pulse access control service 5.0r1", "scope": "ne", "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "junos pulse access control service 4.4r5", "scope": "ne", "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "ive os 8.0r1", "scope": "ne", "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "ive os 7.4r5", "scope": "ne", "trust": 0.3, "vendor": "juniper", "version": null } ], "sources": [ { "db": "BID", "id": "68192" }, { "db": "JVNDB", "id": "JVNDB-2014-002928" }, { "db": "NVD", "id": "CVE-2014-3812" }, { "db": "CNNVD", "id": "CNNVD-201406-307" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:juniper:unified_access_control_software:5.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:unified_access_control_software:4.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:ive_os:8.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:juniper:ive_os:7.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:juniper:mag2600_gateway:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:juniper:mag4610_gateway:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:juniper:mag6610_gateway:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:juniper:mag6611_gateway:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:juniper:infranet_controller_4000:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:juniper:secure_access_700:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:juniper:secure_access_2500:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:juniper:fips_secure_access_4000:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:juniper:infranet_controller_6500:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:juniper:infranet_controller_4500:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:juniper:secure_access_4500:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:juniper:fips_secure_access_6000:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:juniper:fips_infranet_controller_6500:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:juniper:infranet_controller_6000:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:juniper:fips_secure_access_4500:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:juniper:fips_secure_access_6500:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2014-3812" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The vendor reported this issue.", "sources": [ { "db": "BID", "id": "68192" } ], "trust": 0.3 }, "cve": "CVE-2014-3812", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "None", "baseScore": 5.0, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "CVE-2014-3812", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 10.0, "id": "VHN-71752", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:P/I:N/A:N", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "NVD", "id": "CVE-2014-3812", "trust": 1.8, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201406-307", "trust": 0.6, "value": "MEDIUM" }, { "author": "VULHUB", "id": "VHN-71752", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "VULHUB", "id": "VHN-71752" }, { "db": "JVNDB", "id": "JVNDB-2014-002928" }, { "db": "NVD", "id": "CVE-2014-3812" }, { "db": "CNNVD", "id": "CNNVD-201406-307" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The Juniper Junos Pulse Secure Access Service (SSL VPN) devices with IVE OS before 7.4r5 and 8.x before 8.0r1 and Junos Pulse Access Control Service (UAC) before 4.4r5 and 5.x before 5.0r1 enable cipher suites with weak encryption algorithms, which make it easier for remote attackers to obtain sensitive information by sniffing the network. \nSuccessfully exploiting this issue in conjunction with other latent vulnerabilities may allow attackers to gain access to sensitive information that may aid in further attacks. The former is a client that supports remote and mobile users to access corporate resources with various Web devices. The latter is a standards-based, scalable network access control solution. A remote attacker could exploit this vulnerability to obtain sensitive information by sniffing the network", "sources": [ { "db": "NVD", "id": "CVE-2014-3812" }, { "db": "JVNDB", "id": "JVNDB-2014-002928" }, { "db": "BID", "id": "68192" }, { "db": "VULHUB", "id": "VHN-71752" } ], "trust": 1.98 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2014-3812", "trust": 2.8 }, { "db": "JUNIPER", "id": "JSA10628", "trust": 2.0 }, { "db": "JVNDB", "id": "JVNDB-2014-002928", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201406-307", "trust": 0.7 }, { "db": "BID", "id": "68192", "trust": 0.4 }, { "db": "VULHUB", "id": "VHN-71752", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-71752" }, { "db": "BID", "id": "68192" }, { "db": "JVNDB", "id": "JVNDB-2014-002928" }, { "db": "NVD", "id": "CVE-2014-3812" }, { "db": "CNNVD", "id": "CNNVD-201406-307" } ] }, "id": "VAR-201406-0373", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-71752" } ], "trust": 0.01 }, "last_update_date": "2023-12-18T13:39:26.126000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "JSA10628", "trust": 0.8, "url": "http://kb.juniper.net/infocenter/index?page=content\u0026id=jsa10628" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2014-002928" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-310", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-71752" }, { "db": "JVNDB", "id": "JVNDB-2014-002928" }, { "db": "NVD", "id": "CVE-2014-3812" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.9, "url": "http://kb.juniper.net/infocenter/index?page=content\u0026id=jsa10628" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-3812" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-3812" }, { "trust": 0.3, "url": "http://www.juniper.net/" }, { "trust": 0.1, "url": "http://kb.juniper.net/infocenter/index?page=content\u0026amp;id=jsa10628" } ], "sources": [ { "db": "VULHUB", "id": "VHN-71752" }, { "db": "BID", "id": "68192" }, { "db": "JVNDB", "id": "JVNDB-2014-002928" }, { "db": "NVD", "id": "CVE-2014-3812" }, { "db": "CNNVD", "id": "CNNVD-201406-307" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-71752" }, { "db": "BID", "id": "68192" }, { "db": "JVNDB", "id": "JVNDB-2014-002928" }, { "db": "NVD", "id": "CVE-2014-3812" }, { "db": "CNNVD", "id": "CNNVD-201406-307" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2014-06-13T00:00:00", "db": "VULHUB", "id": "VHN-71752" }, { "date": "2014-06-13T00:00:00", "db": "BID", "id": "68192" }, { "date": "2014-06-17T00:00:00", "db": "JVNDB", "id": "JVNDB-2014-002928" }, { "date": "2014-06-13T14:55:16.040000", "db": "NVD", "id": "CVE-2014-3812" }, { "date": "2014-06-16T00:00:00", "db": "CNNVD", "id": "CNNVD-201406-307" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2014-06-16T00:00:00", "db": "VULHUB", "id": "VHN-71752" }, { "date": "2014-06-13T00:00:00", "db": "BID", "id": "68192" }, { "date": "2014-06-17T00:00:00", "db": "JVNDB", "id": "JVNDB-2014-002928" }, { "date": "2014-06-16T13:26:01.637000", "db": "NVD", "id": "CVE-2014-3812" }, { "date": "2014-06-16T00:00:00", "db": "CNNVD", "id": "CNNVD-201406-307" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201406-307" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Juniper Junos Pulse Secure Access Service Device IVE OS and Junos Pulse Access Control Service Vulnerability in which important information is obtained", "sources": [ { "db": "JVNDB", "id": "JVNDB-2014-002928" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "encryption problem", "sources": [ { "db": "CNNVD", "id": "CNNVD-201406-307" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.